01-26-2019, 11:53 PM
First, can somebody tell me if trying to crack anything on my machine is a joke? I don't do this as a hobby or professionallly, I literally just need one password cracked.
My specs:
Windows 7 64bit
CPU: AMD FX 8350 8-core ~4.0 GHz
RAM: 24 GB
GPU: AMD Radeon RX 460, 4GB onboard RAM
Otherwise, it seems like all of the suggestions I've been trying have estimated times of days to years, so I can't even get to a point of exhausting the hashcat session to see if I'm using the right attack mode/arguments/wordlists/charsets/masks/amplifiers/etc.
When I tried the following dictionary attack with dive.rule:
Hashcat64 -a 0 -m 7100 -w 3 (btw, what is the -w 3 argument) hash.txt rockyou.txt (wordlist) -r rules/dive.rule
I got estimated time of (28 years 127 days)
When I tried the following dictionary attack with best64.rule:
Hashcat64 -a 0 -m 7100 -w 3 hash.txt rockyou.txt (wordlist) -r rules/best64.rule
I got estimated time (8 days 2 hours)
When I tried the following brute-force/mask attack:
Hashcat64 -a 3 -m 7100 hash.txt ?a?a?a?a?a?a
I got estimated time of (21 years 206 days), and with only 6 placeholders.
I've tried setting the increment using -i minimum 4 -i maximum 8 and it runs through the 4 set in about 3 hours, then goes to the next increment (5) and estimated time changes to 7 days, so it doesn't seem like increment helps.
I've seen messages during the hashcat sessions:
"Cracking performance lower than expected?
*append -w 3 to the command line (which I did. what does this do?)
*Update your OpenCL runtime / driver the right way: https://hashcat.net/faq/wrongdriver (which I thought I did when I first downloaded hashcat a month ago)
*Create more work items to make use of your parallelization power: https://hashcat.net/faq/morework (which I'm trying to figure out now)
Also as the hashcat session is starting it reads:
Applicable optimizers:
*zero-byte
*single-hash
*single-salt
*brute-force
*slow-hash-simd-loop
*uses-64-bit
are these just descriptions of the session processes?
After reading what I've put here, can someone give me some different sample attack commands to try and explain each argument/section of the command.
Or am I just gonna need a different rig?
Thx for all the help and suggestions thus far.
My specs:
Windows 7 64bit
CPU: AMD FX 8350 8-core ~4.0 GHz
RAM: 24 GB
GPU: AMD Radeon RX 460, 4GB onboard RAM
Otherwise, it seems like all of the suggestions I've been trying have estimated times of days to years, so I can't even get to a point of exhausting the hashcat session to see if I'm using the right attack mode/arguments/wordlists/charsets/masks/amplifiers/etc.
When I tried the following dictionary attack with dive.rule:
Hashcat64 -a 0 -m 7100 -w 3 (btw, what is the -w 3 argument) hash.txt rockyou.txt (wordlist) -r rules/dive.rule
I got estimated time of (28 years 127 days)
When I tried the following dictionary attack with best64.rule:
Hashcat64 -a 0 -m 7100 -w 3 hash.txt rockyou.txt (wordlist) -r rules/best64.rule
I got estimated time (8 days 2 hours)
When I tried the following brute-force/mask attack:
Hashcat64 -a 3 -m 7100 hash.txt ?a?a?a?a?a?a
I got estimated time of (21 years 206 days), and with only 6 placeholders.
I've tried setting the increment using -i minimum 4 -i maximum 8 and it runs through the 4 set in about 3 hours, then goes to the next increment (5) and estimated time changes to 7 days, so it doesn't seem like increment helps.
I've seen messages during the hashcat sessions:
"Cracking performance lower than expected?
*append -w 3 to the command line (which I did. what does this do?)
*Update your OpenCL runtime / driver the right way: https://hashcat.net/faq/wrongdriver (which I thought I did when I first downloaded hashcat a month ago)
*Create more work items to make use of your parallelization power: https://hashcat.net/faq/morework (which I'm trying to figure out now)
Also as the hashcat session is starting it reads:
Applicable optimizers:
*zero-byte
*single-hash
*single-salt
*brute-force
*slow-hash-simd-loop
*uses-64-bit
are these just descriptions of the session processes?
After reading what I've put here, can someone give me some different sample attack commands to try and explain each argument/section of the command.
Or am I just gonna need a different rig?
Thx for all the help and suggestions thus far.